@fedify/fedify 2.2.0-dev.613 → 2.2.0-dev.622

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (207) hide show
  1. package/dist/{accept-D7sAxyNa.js → accept-Dd__NiUL.mjs} +10 -8
  2. package/dist/{assert-MZs1qjMx.js → assert-ddO5KLpe.mjs} +5 -9
  3. package/dist/{assert_equals-DSbWqCm3.js → assert_equals-Ew3jOFa3.mjs} +55 -69
  4. package/dist/{assert_instance_of-DHz7EHNU.js → assert_instance_of-C4Ri6VuN.mjs} +5 -9
  5. package/dist/{assert_not_equals-f3m3epl3.js → assert_not_equals--wG9hV7u.mjs} +6 -13
  6. package/dist/{assert_rejects-0h7I2Esa.js → assert_rejects-B-qJtC9Z.mjs} +6 -11
  7. package/dist/{assert_throws-rjdMBf31.js → assert_throws-4NwKEy2q.mjs} +5 -10
  8. package/dist/{builder-OscY92PK.js → builder-DcSpny3g.mjs} +32 -41
  9. package/dist/{chunk-CGaQZ11T.cjs → chunk-DDcVe30Y.cjs} +23 -24
  10. package/dist/{chunk-DJNbSFdH.js → chunk-nlSIicah.js} +8 -8
  11. package/dist/{client-BxMZiQaD.d.ts → client-AtlibPOU.d.ts} +1 -1
  12. package/dist/{client-CoCIaTNO.js → client-DEpOVgY1.mjs} +9 -13
  13. package/dist/{client-C97KOq3x.d.cts → client-z-8dc-e1.d.cts} +1 -1
  14. package/dist/{collection-CSzG2j1P.js → collection-BD6-SZ6O.mjs} +7 -12
  15. package/dist/compat/mod.cjs +5 -8
  16. package/dist/compat/mod.d.cts +78 -6
  17. package/dist/compat/mod.d.ts +78 -6
  18. package/dist/compat/mod.js +4 -8
  19. package/dist/compat/transformers.test.mjs +62 -0
  20. package/dist/{context-DyJjQQ_H.d.ts → context-BOiMZBu5.d.ts} +9 -18
  21. package/dist/{context-BcqA-0BL.d.cts → context-BhZVy7RB.d.cts} +9 -18
  22. package/dist/{context-Aqenou7c.js → context-Juj6bdHC.mjs} +7 -11
  23. package/dist/deno-D682wzlW.mjs +8 -0
  24. package/dist/{docloader-JiZmL7BP.js → docloader-CCWf4tNV.mjs} +8 -14
  25. package/dist/{esm-nLm00z9V.js → esm-DVILvP5e.mjs} +50 -89
  26. package/dist/federation/builder.test.d.mts +2 -0
  27. package/dist/federation/{builder.test.js → builder.test.mjs} +21 -44
  28. package/dist/federation/collection.test.d.mts +2 -0
  29. package/dist/federation/collection.test.mjs +21 -0
  30. package/dist/federation/handler.test.d.mts +2 -0
  31. package/dist/federation/{handler.test.js → handler.test.mjs} +69 -131
  32. package/dist/federation/idempotency.test.d.mts +2 -0
  33. package/dist/federation/{idempotency.test.js → idempotency.test.mjs} +31 -63
  34. package/dist/federation/inbox.test.d.mts +2 -0
  35. package/dist/federation/{inbox.test.js → inbox.test.mjs} +8 -12
  36. package/dist/federation/keycache.test.d.mts +2 -0
  37. package/dist/federation/{keycache.test.js → keycache.test.mjs} +13 -19
  38. package/dist/federation/kv.test.d.mts +2 -0
  39. package/dist/federation/{kv.test.js → kv.test.mjs} +11 -22
  40. package/dist/federation/middleware.test.d.mts +2 -0
  41. package/dist/federation/{middleware.test.js → middleware.test.mjs} +173 -262
  42. package/dist/federation/mod.cjs +327 -16
  43. package/dist/federation/mod.d.cts +3 -6
  44. package/dist/federation/mod.d.ts +3 -6
  45. package/dist/federation/mod.js +322 -13
  46. package/dist/federation/mq.test.d.mts +2 -0
  47. package/dist/federation/{mq.test.js → mq.test.mjs} +21 -35
  48. package/dist/federation/negotiation.test.d.mts +2 -0
  49. package/dist/federation/{negotiation.test.js → negotiation.test.mjs} +9 -16
  50. package/dist/federation/retry.test.d.mts +2 -0
  51. package/dist/federation/{retry.test.js → retry.test.mjs} +8 -11
  52. package/dist/federation/router.test.d.mts +2 -0
  53. package/dist/federation/{router.test.js → router.test.mjs} +11 -16
  54. package/dist/federation/send.test.d.mts +2 -0
  55. package/dist/federation/{send.test.js → send.test.mjs} +22 -30
  56. package/dist/federation/webfinger.test.d.mts +2 -0
  57. package/dist/federation/{webfinger.test.js → webfinger.test.mjs} +22 -56
  58. package/dist/{http-BnsR906R.cjs → http-BQccxQlj.cjs} +177 -302
  59. package/dist/{http-CKaqhjvP.js → http-CNsnyqrO.mjs} +23 -43
  60. package/dist/{http-BudnHZE2.d.cts → http-CrGuipxe.d.cts} +1 -6
  61. package/dist/{http-IFqEftoZ.js → http-DhwEMhtv.js} +53 -184
  62. package/dist/{http-Dax_FIBo.d.ts → http-aQzN9Ayi.d.ts} +1 -6
  63. package/dist/{inbox-Bd91CVJP.js → inbox-DegXbbbS.mjs} +18 -26
  64. package/dist/{key-DFLFXKER.js → key-vL60OvqM.mjs} +29 -37
  65. package/dist/{keycache-CpGWAUbj.js → keycache-CCSwkQcY.mjs} +5 -10
  66. package/dist/{keys-BFve7QQv.js → keys-BAK-tUlf.mjs} +5 -9
  67. package/dist/{kv-BL4nlICN.d.cts → kv-CbLNp3zQ.d.cts} +1 -1
  68. package/dist/{kv-DXEUEP6z.d.ts → kv-GFYnFoOl.d.ts} +1 -1
  69. package/dist/{kv-cache-Bw2F2ABq.js → kv-cache-B01V7s3h.mjs} +4 -8
  70. package/dist/{kv-cache-Drlz6O_Y.js → kv-cache-CTj3iCix.js} +6 -13
  71. package/dist/{kv-cache-BLXcQvyb.cjs → kv-cache-DxdXJNbj.cjs} +27 -34
  72. package/dist/{kv-QzKcOQgP.js → kv-tL2TOE9X.mjs} +6 -10
  73. package/dist/{ld-CGGXZJK0.js → ld-C3CO00YY.mjs} +17 -31
  74. package/dist/{middleware-DcpBikad.js → middleware-BmsVSOeS.js} +335 -382
  75. package/dist/middleware-C7shNcsp.cjs +4 -0
  76. package/dist/{middleware-B51dB75z.cjs → middleware-Cx0Ny6_7.cjs} +532 -587
  77. package/dist/middleware-DqVGYk56.mjs +5 -0
  78. package/dist/{middleware-B53r4pdM.js → middleware-Du-vh7I_.mjs} +282 -317
  79. package/dist/{mod-em2Il1eD.d.cts → mod-Bp_CzKd4.d.cts} +2 -2
  80. package/dist/{mod-DCbh1JQ5.d.ts → mod-CLgIXe9w.d.ts} +3 -3
  81. package/dist/{mod-jfnweK2w.d.cts → mod-CMEbIaNh.d.cts} +3 -3
  82. package/dist/{mod-D6MdymW7.d.ts → mod-DKOAow7a.d.ts} +2 -2
  83. package/dist/{mod-Coe7KEgX.d.cts → mod-DoJBjjnO.d.cts} +2 -2
  84. package/dist/{mod-D6dOd--H.d.ts → mod-DvxszxXC.d.ts} +2 -2
  85. package/dist/mod.cjs +29 -74
  86. package/dist/mod.d.cts +11 -14
  87. package/dist/mod.d.ts +11 -15
  88. package/dist/mod.js +17 -71
  89. package/dist/{negotiation-BlAuS_nr.js → negotiation-DnsfFF8I.mjs} +7 -11
  90. package/dist/nodeinfo/client.test.d.mts +2 -0
  91. package/dist/nodeinfo/{client.test.js → client.test.mjs} +22 -40
  92. package/dist/nodeinfo/handler.test.d.mts +2 -0
  93. package/dist/nodeinfo/{handler.test.js → handler.test.mjs} +13 -43
  94. package/dist/nodeinfo/mod.cjs +5 -8
  95. package/dist/nodeinfo/mod.d.cts +2 -3
  96. package/dist/nodeinfo/mod.d.ts +2 -3
  97. package/dist/nodeinfo/mod.js +4 -8
  98. package/dist/nodeinfo/types.test.d.mts +2 -0
  99. package/dist/nodeinfo/{types.test.js → types.test.mjs} +9 -16
  100. package/dist/otel/exporter.test.d.mts +2 -0
  101. package/dist/otel/{exporter.test.js → exporter.test.mjs} +124 -178
  102. package/dist/otel/mod.cjs +15 -20
  103. package/dist/otel/mod.d.cts +2 -2
  104. package/dist/otel/mod.d.ts +2 -2
  105. package/dist/otel/mod.js +8 -14
  106. package/dist/{owner-gd0Q9FuU.d.ts → owner-74ARJ5TL.d.ts} +1 -1
  107. package/dist/{owner-1AbPBOOZ.d.cts → owner-CptqhsOy.d.cts} +1 -1
  108. package/dist/{owner-Cye0yQB_.js → owner-DF320w6K.mjs} +11 -16
  109. package/dist/{proof-DdGGXVWM.js → proof-BCWk5oas.js} +32 -58
  110. package/dist/{proof-DV5lC_Bw.js → proof-IyDwwmzL.mjs} +21 -33
  111. package/dist/{proof-CN5iR1tW.cjs → proof-WhNxSv_N.cjs} +133 -157
  112. package/dist/{retry-mqLf4b-R.js → retry-B_E3V_Dx.mjs} +4 -7
  113. package/dist/{router-D9eI0s4b.js → router-CrMLXoOr.mjs} +4 -8
  114. package/dist/runtime/mod.cjs +11 -13
  115. package/dist/runtime/mod.d.cts +6 -2
  116. package/dist/runtime/mod.d.ts +0 -1
  117. package/dist/runtime/mod.js +4 -7
  118. package/dist/{send-C2a_3YAF.js → send-CJQubr5t.mjs} +8 -13
  119. package/dist/sig/accept.test.d.mts +2 -0
  120. package/dist/sig/{accept.test.js → accept.test.mjs} +35 -70
  121. package/dist/sig/http.test.d.mts +2 -0
  122. package/dist/sig/{http.test.js → http.test.mjs} +166 -280
  123. package/dist/sig/key.test.d.mts +2 -0
  124. package/dist/sig/{key.test.js → key.test.mjs} +11 -18
  125. package/dist/sig/ld.test.d.mts +2 -0
  126. package/dist/sig/{ld.test.js → ld.test.mjs} +22 -35
  127. package/dist/sig/mod.cjs +6 -9
  128. package/dist/sig/mod.d.cts +3 -3
  129. package/dist/sig/mod.d.ts +3 -3
  130. package/dist/sig/mod.js +5 -9
  131. package/dist/sig/owner.test.d.mts +2 -0
  132. package/dist/sig/{owner.test.js → owner.test.mjs} +19 -34
  133. package/dist/sig/proof.test.d.mts +2 -0
  134. package/dist/sig/{proof.test.js → proof.test.mjs} +16 -27
  135. package/dist/{std__assert-X-_kMxKM.js → std__assert-Duiq_YC9.mjs} +12 -24
  136. package/dist/testing/{mod.d.ts → mod.d.mts} +26 -90
  137. package/dist/testing/mod.mjs +6 -0
  138. package/dist/{transformers-3g8GZwkZ.cjs → transformers-NeAONrAq.cjs} +20 -25
  139. package/dist/{transformers-C3FLHUd6.js → transformers-ve6e2xcg.js} +3 -7
  140. package/dist/{types-CPz01LGH.js → types-DCP0WLdt.mjs} +4 -7
  141. package/dist/{types-Cd_hszr_.cjs → types-KC4QAoxe.cjs} +29 -34
  142. package/dist/{types-C93Ob9cU.js → types-hvL8ElAs.js} +8 -13
  143. package/dist/utils/docloader.test.d.mts +2 -0
  144. package/dist/utils/{docloader.test.js → docloader.test.mjs} +14 -25
  145. package/dist/utils/kv-cache.test.d.mts +2 -0
  146. package/dist/utils/{kv-cache.test.js → kv-cache.test.mjs} +25 -40
  147. package/dist/utils/mod.cjs +5 -9
  148. package/dist/utils/mod.d.cts +1 -3
  149. package/dist/utils/mod.d.ts +1 -3
  150. package/dist/utils/mod.js +4 -9
  151. package/dist/vocab/cjs.test.d.mts +2 -0
  152. package/dist/vocab/cjs.test.mjs +14 -0
  153. package/dist/vocab/mod.cjs +10 -12
  154. package/dist/vocab/mod.js +3 -5
  155. package/package.json +8 -8
  156. package/dist/compat/transformers.test.d.ts +0 -3
  157. package/dist/compat/transformers.test.js +0 -88
  158. package/dist/compat-Bb4NuTUO.js +0 -4
  159. package/dist/compat-DmDDELst.cjs +0 -4
  160. package/dist/deno-CnMqla6T.js +0 -121
  161. package/dist/federation/builder.test.d.ts +0 -3
  162. package/dist/federation/collection.test.d.ts +0 -3
  163. package/dist/federation/collection.test.js +0 -32
  164. package/dist/federation/handler.test.d.ts +0 -3
  165. package/dist/federation/idempotency.test.d.ts +0 -3
  166. package/dist/federation/inbox.test.d.ts +0 -3
  167. package/dist/federation/keycache.test.d.ts +0 -3
  168. package/dist/federation/kv.test.d.ts +0 -3
  169. package/dist/federation/middleware.test.d.ts +0 -3
  170. package/dist/federation/mq.test.d.ts +0 -3
  171. package/dist/federation/negotiation.test.d.ts +0 -3
  172. package/dist/federation/retry.test.d.ts +0 -3
  173. package/dist/federation/router.test.d.ts +0 -3
  174. package/dist/federation/send.test.d.ts +0 -3
  175. package/dist/federation/webfinger.test.d.ts +0 -3
  176. package/dist/federation-Bp3HI26G.cjs +0 -350
  177. package/dist/federation-DaMfqRm4.js +0 -332
  178. package/dist/middleware-B0kNQMO0.js +0 -27
  179. package/dist/middleware-BYQL9cdV.js +0 -12
  180. package/dist/middleware-DfNqksSs.cjs +0 -12
  181. package/dist/mod-B7QkWzrL.d.cts +0 -80
  182. package/dist/mod-Bh8mqlYw.d.cts +0 -9
  183. package/dist/mod-D6HodEq7.d.ts +0 -7
  184. package/dist/mod-SMHOMNpZ.d.ts +0 -82
  185. package/dist/mod-gq_Xfdz8.d.cts +0 -1
  186. package/dist/nodeinfo/client.test.d.ts +0 -3
  187. package/dist/nodeinfo/handler.test.d.ts +0 -3
  188. package/dist/nodeinfo/types.test.d.ts +0 -3
  189. package/dist/nodeinfo-DoESQxq5.js +0 -4
  190. package/dist/nodeinfo-DuMYTpbZ.cjs +0 -4
  191. package/dist/otel/exporter.test.d.ts +0 -3
  192. package/dist/runtime-c2Njxsry.cjs +0 -17
  193. package/dist/runtime-poamPCMb.js +0 -13
  194. package/dist/sig/accept.test.d.ts +0 -3
  195. package/dist/sig/http.test.d.ts +0 -3
  196. package/dist/sig/key.test.d.ts +0 -3
  197. package/dist/sig/ld.test.d.ts +0 -3
  198. package/dist/sig/owner.test.d.ts +0 -3
  199. package/dist/sig/proof.test.d.ts +0 -3
  200. package/dist/sig-BNhspNOf.js +0 -4
  201. package/dist/sig-vX39WyWI.cjs +0 -4
  202. package/dist/testing/mod.js +0 -10
  203. package/dist/utils/docloader.test.d.ts +0 -3
  204. package/dist/utils/kv-cache.test.d.ts +0 -3
  205. package/dist/utils-BQ9KqEK9.cjs +0 -4
  206. package/dist/utils-Dn5OPdSW.js +0 -4
  207. /package/dist/{mod-AGjRfPjT.d.ts → compat/transformers.test.d.mts} +0 -0
@@ -1,134 +1,26 @@
1
-
2
- const { Temporal } = require("@js-temporal/polyfill");
3
- const { URLPattern } = require("urlpattern-polyfill");
4
-
5
- const require_chunk = require('./chunk-CGaQZ11T.cjs');
6
- const __logtape_logtape = require_chunk.__toESM(require("@logtape/logtape"));
7
- const __fedify_vocab = require_chunk.__toESM(require("@fedify/vocab"));
8
- const __opentelemetry_api = require_chunk.__toESM(require("@opentelemetry/api"));
9
- const byte_encodings_hex = require_chunk.__toESM(require("byte-encodings/hex"));
10
- const structured_field_values = require_chunk.__toESM(require("structured-field-values"));
11
- const __fedify_vocab_runtime = require_chunk.__toESM(require("@fedify/vocab-runtime"));
12
- const __opentelemetry_semantic_conventions = require_chunk.__toESM(require("@opentelemetry/semantic-conventions"));
13
- const byte_encodings_base64 = require_chunk.__toESM(require("byte-encodings/base64"));
14
-
1
+ const { Temporal } = require("@js-temporal/polyfill");
2
+ const { URLPattern } = require("urlpattern-polyfill");
3
+ require("./chunk-DDcVe30Y.cjs");
4
+ let _logtape_logtape = require("@logtape/logtape");
5
+ let _fedify_vocab = require("@fedify/vocab");
6
+ let _opentelemetry_api = require("@opentelemetry/api");
7
+ let byte_encodings_hex = require("byte-encodings/hex");
8
+ let structured_field_values = require("structured-field-values");
9
+ let _fedify_vocab_runtime = require("@fedify/vocab-runtime");
10
+ let _opentelemetry_semantic_conventions = require("@opentelemetry/semantic-conventions");
11
+ let byte_encodings_base64 = require("byte-encodings/base64");
15
12
  //#region deno.json
16
13
  var name = "@fedify/fedify";
17
- var version = "2.2.0-dev.613+cf8cd122";
18
- var license = "MIT";
19
- var exports$1 = {
20
- ".": "./src/mod.ts",
21
- "./compat": "./src/compat/mod.ts",
22
- "./federation": "./src/federation/mod.ts",
23
- "./nodeinfo": "./src/nodeinfo/mod.ts",
24
- "./otel": "./src/otel/mod.ts",
25
- "./runtime": "./src/runtime/mod.ts",
26
- "./sig": "./src/sig/mod.ts",
27
- "./utils": "./src/utils/mod.ts",
28
- "./vocab": "./src/vocab/mod.ts"
29
- };
30
- var imports = {
31
- "@multiformats/base-x": "npm:@multiformats/base-x@^4.0.1",
32
- "@std/assert": "jsr:@std/assert@^0.226.0",
33
- "@std/url": "jsr:@std/url@^0.225.1",
34
- "asn1js": "npm:asn1js@^3.0.7",
35
- "fast-check": "npm:fast-check@^3.22.0",
36
- "fetch-mock": "npm:fetch-mock@^12.5.2",
37
- "json-canon": "npm:json-canon@^1.0.1",
38
- "jsonld": "npm:jsonld@^9.0.0",
39
- "pkijs": "npm:pkijs@^3.3.3",
40
- "structured-field-values": "npm:structured-field-values@^2.0.4",
41
- "uri-template-router": "npm:uri-template-router@^1.0.0",
42
- "url-template": "npm:url-template@^3.1.1"
43
- };
44
- var exclude = [
45
- ".test-report.xml",
46
- "apidoc/",
47
- "dist/",
48
- "node_modules/",
49
- "npm/",
50
- "pnpm-lock.yaml",
51
- "src/cfworkers/dist/",
52
- "src/cfworkers/fixtures/",
53
- "src/cfworkers/imports.ts",
54
- "src/cfworkers/README.md",
55
- "src/cfworkers/server.ts",
56
- "src/cfworkers/server.js",
57
- "src/cfworkers/server.js.map"
58
- ];
59
- var publish = { "exclude": [
60
- "**/*.test.ts",
61
- "src/testing/",
62
- "tsdown.config.ts",
63
- "scripts/",
64
- "wrangler.toml"
65
- ] };
66
- var tasks = {
67
- "codegen": "deno task -f @fedify/vocab compile",
68
- "cache": {
69
- "command": "deno cache src/mod.ts",
70
- "dependencies": ["codegen"]
71
- },
72
- "check": {
73
- "command": "deno fmt --check && deno lint && deno check src/**/*.ts",
74
- "dependencies": ["codegen"]
75
- },
76
- "test": {
77
- "command": "deno test --check --doc --allow-read --allow-write --allow-env --unstable-kv --trace-leaks --parallel",
78
- "dependencies": ["codegen"]
79
- },
80
- "coverage": "deno task test --clean --coverage && deno coverage --html coverage",
81
- "bench": {
82
- "command": "deno bench --allow-read --allow-write --allow-net --allow-env --allow-run --unstable-kv",
83
- "dependencies": ["codegen"]
84
- },
85
- "apidoc": {
86
- "command": "deno doc --html --name=Fedify --output=apidoc/ src/mod.ts",
87
- "dependencies": ["codegen"]
88
- },
89
- "publish": {
90
- "command": "deno publish",
91
- "dependencies": ["codegen"]
92
- },
93
- "pnpm:install": "pnpm install --silent",
94
- "pnpm:build": {
95
- "command": "pnpm exec tsdown",
96
- "dependencies": ["pnpm:build-vocab"]
97
- },
98
- "test:node": {
99
- "command": "cd dist/ && node --test",
100
- "dependencies": ["pnpm:build"]
101
- },
102
- "test:bun": {
103
- "command": "cd dist/ && bun test --timeout 60000",
104
- "dependencies": ["pnpm:build"]
105
- },
106
- "test:cfworkers": {
107
- "command": "pnpm exec wrangler deploy --dry-run --outdir src/cfworkers && node --import=tsx src/cfworkers/client.ts",
108
- "dependencies": ["pnpm:build"]
109
- },
110
- "test-all": { "dependencies": [
111
- "check",
112
- "test",
113
- "test:node",
114
- "test:bun",
115
- "test:cfworkers"
116
- ] }
117
- };
118
- var deno_default = {
119
- name,
120
- version,
121
- license,
122
- exports: exports$1,
123
- imports,
124
- exclude,
125
- publish,
126
- tasks
127
- };
128
-
14
+ var version = "2.2.0-dev.622+e54cb037";
129
15
  //#endregion
130
16
  //#region src/sig/accept.ts
131
17
  /**
18
+ * `Accept-Signature` header parsing, serialization, and validation utilities
19
+ * for RFC 9421 §5 challenge-response negotiation.
20
+ *
21
+ * @module
22
+ */
23
+ /**
132
24
  * Parses an `Accept-Signature` header value (RFC 9421 §5.1) into an
133
25
  * array of {@link AcceptSignatureMember} objects.
134
26
  *
@@ -147,7 +39,7 @@ function parseAcceptSignature(header) {
147
39
  try {
148
40
  return parseEachSignature((0, structured_field_values.decodeDict)(header));
149
41
  } catch {
150
- (0, __logtape_logtape.getLogger)([
42
+ (0, _logtape_logtape.getLogger)([
151
43
  "fedify",
152
44
  "sig",
153
45
  "http"
@@ -216,7 +108,7 @@ const compactParameters = (member) => {
216
108
  * @since 2.1.0
217
109
  */
218
110
  function validateAcceptSignature(members) {
219
- const logger = (0, __logtape_logtape.getLogger)([
111
+ const logger = (0, _logtape_logtape.getLogger)([
220
112
  "fedify",
221
113
  "sig",
222
114
  "http"
@@ -259,7 +151,6 @@ function fulfillAcceptSignature(entry, localKeyId, localAlg) {
259
151
  expires: entry.parameters.expires
260
152
  };
261
153
  }
262
-
263
154
  //#endregion
264
155
  //#region src/sig/key.ts
265
156
  /**
@@ -275,8 +166,7 @@ function validateCryptoKey(key, type) {
275
166
  if (!key.extractable) throw new TypeError("The key is not extractable.");
276
167
  if (key.algorithm.name !== "RSASSA-PKCS1-v1_5" && key.algorithm.name !== "Ed25519") throw new TypeError("Currently only RSASSA-PKCS1-v1_5 and Ed25519 keys are supported. More algorithms will be added in the future!");
277
168
  if (key.algorithm.name === "RSASSA-PKCS1-v1_5") {
278
- const algorithm = key.algorithm;
279
- if (algorithm.hash.name !== "SHA-256") throw new TypeError("For compatibility with the existing Fediverse software (e.g., Mastodon), hash algorithm for RSASSA-PKCS1-v1_5 keys must be SHA-256.");
169
+ if (key.algorithm.hash.name !== "SHA-256") throw new TypeError("For compatibility with the existing Fediverse software (e.g., Mastodon), hash algorithm for RSASSA-PKCS1-v1_5 keys must be SHA-256.");
280
170
  }
281
171
  }
282
172
  /**
@@ -287,7 +177,7 @@ function validateCryptoKey(key, type) {
287
177
  * @throws {TypeError} If the algorithm is unsupported.
288
178
  */
289
179
  function generateCryptoKeyPair(algorithm) {
290
- if (algorithm == null) (0, __logtape_logtape.getLogger)([
180
+ if (algorithm == null) (0, _logtape_logtape.getLogger)([
291
181
  "fedify",
292
182
  "sig",
293
183
  "key"
@@ -342,10 +232,9 @@ async function importJwk(jwk, type) {
342
232
  return key;
343
233
  }
344
234
  async function withFetchKeySpan(keyId, tracerProvider, fetcher) {
345
- tracerProvider ??= __opentelemetry_api.trace.getTracerProvider();
346
- const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
347
- return await tracer.startActiveSpan("activitypub.fetch_key", {
348
- kind: __opentelemetry_api.SpanKind.CLIENT,
235
+ tracerProvider ??= _opentelemetry_api.trace.getTracerProvider();
236
+ return await tracerProvider.getTracer(name, version).startActiveSpan("activitypub.fetch_key", {
237
+ kind: _opentelemetry_api.SpanKind.CLIENT,
349
238
  attributes: {
350
239
  "http.method": "GET",
351
240
  "url.full": keyId.href,
@@ -362,7 +251,7 @@ async function withFetchKeySpan(keyId, tracerProvider, fetcher) {
362
251
  return result;
363
252
  } catch (e) {
364
253
  span.setStatus({
365
- code: __opentelemetry_api.SpanStatusCode.ERROR,
254
+ code: _opentelemetry_api.SpanStatusCode.ERROR,
366
255
  message: String(e)
367
256
  });
368
257
  throw e;
@@ -405,41 +294,41 @@ function fetchKey(keyId, cls, options = {}) {
405
294
  async function fetchKeyDetailed(keyId, cls, options = {}) {
406
295
  const cacheKey = typeof keyId === "string" ? new URL(keyId) : keyId;
407
296
  return await withFetchKeySpan(cacheKey, options.tracerProvider, async () => {
408
- return await fetchKeyWithResult(cacheKey, cls, options, async (cacheKey$1, keyId$1, keyCache, logger) => {
409
- const fetchError = await keyCache?.getFetchError?.(cacheKey$1);
297
+ return await fetchKeyWithResult(cacheKey, cls, options, async (cacheKey, keyId, keyCache, logger) => {
298
+ const fetchError = await keyCache?.getFetchError?.(cacheKey);
410
299
  if (fetchError != null) {
411
- logger.debug("Entry {keyId} found in cache with preserved fetch failure details.", { keyId: keyId$1 });
300
+ logger.debug("Entry {keyId} found in cache with preserved fetch failure details.", { keyId });
412
301
  return {
413
302
  key: null,
414
303
  cached: true,
415
304
  fetchError
416
305
  };
417
306
  }
418
- logger.debug("Entry {keyId} found in cache, but no fetch failure details are available.", { keyId: keyId$1 });
307
+ logger.debug("Entry {keyId} found in cache, but no fetch failure details are available.", { keyId });
419
308
  return {
420
309
  key: null,
421
310
  cached: true
422
311
  };
423
- }, async (error, cacheKey$1, keyId$1, keyCache, logger) => {
312
+ }, async (error, cacheKey, keyId, keyCache, logger) => {
424
313
  logger.debug("Failed to fetch key {keyId}.", {
425
- keyId: keyId$1,
314
+ keyId,
426
315
  error
427
316
  });
428
- await keyCache?.set(cacheKey$1, null);
429
- if (error instanceof __fedify_vocab_runtime.FetchError && error.response != null) {
430
- const fetchError$1 = {
317
+ await keyCache?.set(cacheKey, null);
318
+ if (error instanceof _fedify_vocab_runtime.FetchError && error.response != null) {
319
+ const fetchError = {
431
320
  status: error.response.status,
432
321
  response: error.response.clone()
433
322
  };
434
- await keyCache?.setFetchError?.(cacheKey$1, fetchError$1);
323
+ await keyCache?.setFetchError?.(cacheKey, fetchError);
435
324
  return {
436
325
  key: null,
437
326
  cached: false,
438
- fetchError: fetchError$1
327
+ fetchError
439
328
  };
440
329
  }
441
330
  const fetchError = { error: error instanceof Error ? error : new Error(String(error)) };
442
- await keyCache?.setFetchError?.(cacheKey$1, fetchError);
331
+ await keyCache?.setFetchError?.(cacheKey, fetchError);
443
332
  return {
444
333
  key: null,
445
334
  cached: false,
@@ -472,7 +361,7 @@ async function clearFetchErrorMetadata(keyId, keyCache) {
472
361
  async function resolveFetchedKey(document, cacheKey, keyId, cls, { documentLoader, contextLoader, keyCache, tracerProvider }, logger) {
473
362
  let object;
474
363
  try {
475
- object = await __fedify_vocab.Object.fromJsonLd(document, {
364
+ object = await _fedify_vocab.Object.fromJsonLd(document, {
476
365
  documentLoader,
477
366
  contextLoader,
478
367
  tracerProvider
@@ -485,8 +374,8 @@ async function resolveFetchedKey(document, cacheKey, keyId, cls, { documentLoade
485
374
  contextLoader,
486
375
  tracerProvider
487
376
  });
488
- } catch (e$1) {
489
- if (e$1 instanceof TypeError) {
377
+ } catch (e) {
378
+ if (e instanceof TypeError) {
490
379
  logger.debug("Failed to verify; key {keyId} returned an invalid object.", { keyId });
491
380
  await keyCache?.set(cacheKey, null);
492
381
  await clearFetchErrorMetadata(cacheKey, keyCache);
@@ -495,13 +384,13 @@ async function resolveFetchedKey(document, cacheKey, keyId, cls, { documentLoade
495
384
  cached: false
496
385
  };
497
386
  }
498
- throw e$1;
387
+ throw e;
499
388
  }
500
389
  }
501
390
  let key = null;
502
391
  if (object instanceof cls) key = object;
503
- else if ((0, __fedify_vocab.isActor)(object)) {
504
- const keys = cls === __fedify_vocab.CryptographicKey ? object.getPublicKeys({
392
+ else if ((0, _fedify_vocab.isActor)(object)) {
393
+ const keys = cls === _fedify_vocab.CryptographicKey ? object.getPublicKeys({
505
394
  documentLoader,
506
395
  contextLoader,
507
396
  tracerProvider
@@ -563,7 +452,7 @@ async function resolveFetchedKey(document, cacheKey, keyId, cls, { documentLoade
563
452
  };
564
453
  }
565
454
  async function fetchKeyWithResult(cacheKey, cls, options, onCachedUnavailable, onFetchError) {
566
- const logger = (0, __logtape_logtape.getLogger)([
455
+ const logger = (0, _logtape_logtape.getLogger)([
567
456
  "fedify",
568
457
  "sig",
569
458
  "key"
@@ -576,38 +465,35 @@ async function fetchKeyWithResult(cacheKey, cls, options, onCachedUnavailable, o
576
465
  logger.debug("Fetching key {keyId} to verify signature...", { keyId });
577
466
  let document;
578
467
  try {
579
- const remoteDocument = await (options.documentLoader ?? (0, __fedify_vocab_runtime.getDocumentLoader)())(keyId);
580
- document = remoteDocument.document;
468
+ document = (await (options.documentLoader ?? (0, _fedify_vocab_runtime.getDocumentLoader)())(keyId)).document;
581
469
  } catch (error) {
582
470
  return await onFetchError(error, cacheKey, keyId, keyCache, logger);
583
471
  }
584
472
  return await resolveFetchedKey(document, cacheKey, keyId, cls, options, logger);
585
473
  }
586
474
  async function fetchKeyInternal(keyId, cls, options = {}) {
587
- const cacheKey = typeof keyId === "string" ? new URL(keyId) : keyId;
588
- return await fetchKeyWithResult(cacheKey, cls, options, (_cacheKey, _keyId, _keyCache, _logger) => {
475
+ return await fetchKeyWithResult(typeof keyId === "string" ? new URL(keyId) : keyId, cls, options, (_cacheKey, _keyId, _keyCache, _logger) => {
589
476
  return {
590
477
  key: null,
591
478
  cached: true
592
479
  };
593
- }, async (error, cacheKey$1, keyId$1, keyCache, logger) => {
480
+ }, async (error, cacheKey, keyId, keyCache, logger) => {
594
481
  logger.debug("Failed to fetch key {keyId}.", {
595
- keyId: keyId$1,
482
+ keyId,
596
483
  error
597
484
  });
598
- await keyCache?.set(cacheKey$1, null);
599
- if (error instanceof __fedify_vocab_runtime.FetchError && error.response != null) await keyCache?.setFetchError?.(cacheKey$1, {
485
+ await keyCache?.set(cacheKey, null);
486
+ if (error instanceof _fedify_vocab_runtime.FetchError && error.response != null) await keyCache?.setFetchError?.(cacheKey, {
600
487
  status: error.response.status,
601
488
  response: error.response.clone()
602
489
  });
603
- else await keyCache?.setFetchError?.(cacheKey$1, { error: error instanceof Error ? error : new Error(String(error)) });
490
+ else await keyCache?.setFetchError?.(cacheKey, { error: error instanceof Error ? error : new Error(String(error)) });
604
491
  return {
605
492
  key: null,
606
493
  cached: false
607
494
  };
608
495
  });
609
496
  }
610
-
611
497
  //#endregion
612
498
  //#region src/sig/http.ts
613
499
  const DEFAULT_MAX_REDIRECTION = 20;
@@ -622,24 +508,22 @@ const DEFAULT_MAX_REDIRECTION = 20;
622
508
  */
623
509
  async function signRequest(request, privateKey, keyId, options = {}) {
624
510
  validateCryptoKey(privateKey, "private");
625
- const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
626
- const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
627
- return await tracer.startActiveSpan("http_signatures.sign", async (span) => {
511
+ return await (options.tracerProvider ?? _opentelemetry_api.trace.getTracerProvider()).getTracer(name, version).startActiveSpan("http_signatures.sign", async (span) => {
628
512
  try {
629
513
  const spec = options.spec ?? "draft-cavage-http-signatures-12";
630
514
  let signed;
631
515
  if (spec === "rfc9421") signed = await signRequestRfc9421(request, privateKey, keyId, span, options.currentTime, options.body, options.rfc9421);
632
516
  else signed = await signRequestDraft(request, privateKey, keyId, span, options.currentTime, options.body);
633
517
  if (span.isRecording()) {
634
- span.setAttribute(__opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_METHOD, signed.method);
635
- span.setAttribute(__opentelemetry_semantic_conventions.ATTR_URL_FULL, signed.url);
636
- for (const [name$1, value] of signed.headers) span.setAttribute((0, __opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name$1), value);
518
+ span.setAttribute(_opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_METHOD, signed.method);
519
+ span.setAttribute(_opentelemetry_semantic_conventions.ATTR_URL_FULL, signed.url);
520
+ for (const [name, value] of signed.headers) span.setAttribute((0, _opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name), value);
637
521
  span.setAttribute("http_signatures.key_id", keyId.href);
638
522
  }
639
523
  return signed;
640
524
  } catch (error) {
641
525
  span.setStatus({
642
- code: __opentelemetry_api.SpanStatusCode.ERROR,
526
+ code: _opentelemetry_api.SpanStatusCode.ERROR,
643
527
  message: String(error)
644
528
  });
645
529
  throw error;
@@ -661,8 +545,8 @@ async function signRequestDraft(request, privateKey, keyId, span, currentTime, b
661
545
  }
662
546
  if (!headers.has("Date")) headers.set("Date", currentTime == null ? (/* @__PURE__ */ new Date()).toUTCString() : new Date(currentTime.toString()).toUTCString());
663
547
  const serialized = [["(request-target)", `${request.method.toLowerCase()} ${url.pathname}`], ...headers];
664
- const headerNames = serialized.map(([name$1]) => name$1);
665
- const message = serialized.map(([name$1, value]) => `${name$1}: ${value.trim()}`).join("\n");
548
+ const headerNames = serialized.map(([name]) => name);
549
+ const message = serialized.map(([name, value]) => `${name}: ${value.trim()}`).join("\n");
666
550
  const signature = await crypto.subtle.sign("RSASSA-PKCS1-v1_5", privateKey, new TextEncoder().encode(message));
667
551
  const sigHeader = `keyId="${keyId.href}",algorithm="rsa-sha256",headers="${headerNames.join(" ")}",signature="${(0, byte_encodings_base64.encodeBase64)(signature)}"`;
668
552
  headers.set("Signature", sigHeader);
@@ -732,9 +616,7 @@ const derivedComponents = {
732
616
  * @returns The formatted signature string.
733
617
  */
734
618
  function formatRfc9421Signature(signature, components, parameters, label = "sig1") {
735
- const signatureInputValue = `${label}=(${components.map((c) => formatComponentId(c)).join(" ")});${parameters}`;
736
- const signatureValue = `${label}=:${(0, byte_encodings_base64.encodeBase64)(signature)}:`;
737
- return [signatureInputValue, signatureValue];
619
+ return [`${label}=(${components.map((c) => formatComponentId(c)).join(" ")});${parameters}`, `${label}=:${(0, byte_encodings_base64.encodeBase64)(signature)}:`];
738
620
  }
739
621
  /**
740
622
  * Parse RFC 9421 Signature-Input header.
@@ -746,7 +628,7 @@ function parseRfc9421SignatureInput(signatureInput) {
746
628
  try {
747
629
  dict = (0, structured_field_values.decodeDict)(signatureInput);
748
630
  } catch (error) {
749
- (0, __logtape_logtape.getLogger)([
631
+ (0, _logtape_logtape.getLogger)([
750
632
  "fedify",
751
633
  "sig",
752
634
  "http"
@@ -786,7 +668,7 @@ function parseRfc9421Signature(signature) {
786
668
  try {
787
669
  dict = (0, structured_field_values.decodeDict)(signature);
788
670
  } catch (error) {
789
- (0, __logtape_logtape.getLogger)([
671
+ (0, _logtape_logtape.getLogger)([
790
672
  "fedify",
791
673
  "sig",
792
674
  "http"
@@ -840,12 +722,11 @@ async function signRequestRfc9421(request, privateKey, keyId, span, currentTime,
840
722
  value: "content-digest",
841
723
  params: {}
842
724
  }] : []];
843
- const expires = rfc9421Options?.expires === true ? (currentTime.epochMilliseconds / 1e3 | 0) + 3600 : void 0;
844
725
  const signatureParams = formatRfc9421SignatureParameters({
845
726
  algorithm: "rsa-v1_5-sha256",
846
727
  keyId,
847
728
  created,
848
- expires,
729
+ expires: rfc9421Options?.expires === true ? (currentTime.epochMilliseconds / 1e3 | 0) + 3600 : void 0,
849
730
  nonce: rfc9421Options?.nonce,
850
731
  tag: rfc9421Options?.tag
851
732
  });
@@ -955,13 +836,11 @@ async function verifyRequest(request, options = {}) {
955
836
  * @since 2.1.0
956
837
  */
957
838
  async function verifyRequestDetailed(request, options = {}) {
958
- const tracerProvider = options.tracerProvider ?? __opentelemetry_api.trace.getTracerProvider();
959
- const tracer = tracerProvider.getTracer(deno_default.name, deno_default.version);
960
- return await tracer.startActiveSpan("http_signatures.verify", async (span) => {
839
+ return await (options.tracerProvider ?? _opentelemetry_api.trace.getTracerProvider()).getTracer(name, version).startActiveSpan("http_signatures.verify", async (span) => {
961
840
  if (span.isRecording()) {
962
- span.setAttribute(__opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_METHOD, request.method);
963
- span.setAttribute(__opentelemetry_semantic_conventions.ATTR_URL_FULL, request.url);
964
- for (const [name$1, value] of request.headers) span.setAttribute((0, __opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name$1), value);
841
+ span.setAttribute(_opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_METHOD, request.method);
842
+ span.setAttribute(_opentelemetry_semantic_conventions.ATTR_URL_FULL, request.url);
843
+ for (const [name, value] of request.headers) span.setAttribute((0, _opentelemetry_semantic_conventions.ATTR_HTTP_REQUEST_HEADER)(name), value);
965
844
  }
966
845
  try {
967
846
  let spec = options.spec;
@@ -970,11 +849,11 @@ async function verifyRequestDetailed(request, options = {}) {
970
849
  if (spec === "rfc9421") result = await verifyRequestRfc9421(request, span, options);
971
850
  else result = await verifyRequestDraft(request, span, options);
972
851
  recordVerificationResult(span, result);
973
- if (!result.verified) span.setStatus({ code: __opentelemetry_api.SpanStatusCode.ERROR });
852
+ if (!result.verified) span.setStatus({ code: _opentelemetry_api.SpanStatusCode.ERROR });
974
853
  return result;
975
854
  } catch (error) {
976
855
  span.setStatus({
977
- code: __opentelemetry_api.SpanStatusCode.ERROR,
856
+ code: _opentelemetry_api.SpanStatusCode.ERROR,
978
857
  message: String(error)
979
858
  });
980
859
  throw error;
@@ -984,7 +863,7 @@ async function verifyRequestDetailed(request, options = {}) {
984
863
  });
985
864
  }
986
865
  async function verifyRequestDraft(request, span, { documentLoader, contextLoader, timeWindow, currentTime, keyCache, tracerProvider } = {}) {
987
- const logger = (0, __logtape_logtape.getLogger)([
866
+ const logger = (0, _logtape_logtape.getLogger)([
988
867
  "fedify",
989
868
  "sig",
990
869
  "http"
@@ -1132,7 +1011,7 @@ async function verifyRequestDraft(request, span, { documentLoader, contextLoader
1132
1011
  if (keyIdUrl == null) return invalidSignatureResult(null);
1133
1012
  span?.setAttribute("http_signatures.key_id", keyId);
1134
1013
  if ("algorithm" in sigValues) span?.setAttribute("http_signatures.algorithm", sigValues.algorithm);
1135
- const { key, cached, fetchError } = await fetchKeyDetailed(keyIdUrl, __fedify_vocab.CryptographicKey, {
1014
+ const { key, cached, fetchError } = await fetchKeyDetailed(keyIdUrl, _fedify_vocab.CryptographicKey, {
1136
1015
  documentLoader,
1137
1016
  contextLoader,
1138
1017
  keyCache,
@@ -1149,11 +1028,10 @@ async function verifyRequestDraft(request, span, { documentLoader, contextLoader
1149
1028
  logger.debug("Failed to verify; required headers missing in the Signature header: {headers}.", { headers });
1150
1029
  return invalidSignatureResult(keyIdUrl);
1151
1030
  }
1152
- const message = headerNames.map((name$1) => `${name$1}: ` + (name$1 === "(request-target)" ? `${request.method.toLowerCase()} ${new URL(request.url).pathname}` : name$1 === "(created)" ? sigValues.created ?? "" : name$1 === "(expires)" ? sigValues.expires ?? "" : name$1 === "host" ? request.headers.get("host") ?? new URL(request.url).host : request.headers.get(name$1))).join("\n");
1031
+ const message = headerNames.map((name) => `${name}: ` + (name === "(request-target)" ? `${request.method.toLowerCase()} ${new URL(request.url).pathname}` : name === "(created)" ? sigValues.created ?? "" : name === "(expires)" ? sigValues.expires ?? "" : name === "host" ? request.headers.get("host") ?? new URL(request.url).host : request.headers.get(name))).join("\n");
1153
1032
  const sig = (0, byte_encodings_base64.decodeBase64)(signature);
1154
1033
  span?.setAttribute("http_signatures.signature", (0, byte_encodings_hex.encodeHex)(sig));
1155
- const verified = await crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, sig, new TextEncoder().encode(message));
1156
- if (!verified) {
1034
+ if (!await crypto.subtle.verify("RSASSA-PKCS1-v1_5", key.publicKey, sig, new TextEncoder().encode(message))) {
1157
1035
  if (cached) {
1158
1036
  logger.debug("Failed to verify with the cached key {keyId}; signature {signature} is invalid. Retrying with the freshly fetched key...", {
1159
1037
  keyId,
@@ -1167,7 +1045,7 @@ async function verifyRequestDraft(request, span, { documentLoader, contextLoader
1167
1045
  currentTime,
1168
1046
  keyCache: {
1169
1047
  get: () => Promise.resolve(void 0),
1170
- set: async (keyId$1, key$1) => await keyCache?.set(keyId$1, key$1)
1048
+ set: async (keyId, key) => await keyCache?.set(keyId, key)
1171
1049
  }
1172
1050
  });
1173
1051
  }
@@ -1245,7 +1123,7 @@ async function verifyRfc9421ContentDigest(digestHeader, body) {
1245
1123
  return false;
1246
1124
  }
1247
1125
  async function verifyRequestRfc9421(request, span, { documentLoader, contextLoader, timeWindow, currentTime, keyCache, tracerProvider } = {}) {
1248
- const logger = (0, __logtape_logtape.getLogger)([
1126
+ const logger = (0, _logtape_logtape.getLogger)([
1249
1127
  "fedify",
1250
1128
  "sig",
1251
1129
  "http"
@@ -1329,9 +1207,7 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
1329
1207
  failure = invalidSignatureResult(keyId);
1330
1208
  continue;
1331
1209
  }
1332
- const body = await request.arrayBuffer();
1333
- const digestValid = await verifyRfc9421ContentDigest(contentDigestHeader, body);
1334
- if (!digestValid) {
1210
+ if (!await verifyRfc9421ContentDigest(contentDigestHeader, await request.arrayBuffer())) {
1335
1211
  logger.debug("Failed to verify; Content-Digest verification failed.", { contentDigest: contentDigestHeader });
1336
1212
  failure = invalidSignatureResult(keyId);
1337
1213
  continue;
@@ -1343,7 +1219,7 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
1343
1219
  failure = invalidSignatureResult(null);
1344
1220
  continue;
1345
1221
  }
1346
- const { key, cached, fetchError } = await fetchKeyDetailed(keyId, __fedify_vocab.CryptographicKey, {
1222
+ const { key, cached, fetchError } = await fetchKeyDetailed(keyId, _fedify_vocab.CryptographicKey, {
1347
1223
  documentLoader,
1348
1224
  contextLoader,
1349
1225
  keyCache,
@@ -1389,8 +1265,7 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
1389
1265
  const signatureBaseBytes = new TextEncoder().encode(signatureBase);
1390
1266
  span?.setAttribute("http_signatures.signature", (0, byte_encodings_hex.encodeHex)(sigBytes));
1391
1267
  try {
1392
- const verified = await crypto.subtle.verify(algorithm, key.publicKey, sigBytes.slice(), signatureBaseBytes);
1393
- if (verified) return {
1268
+ if (await crypto.subtle.verify(algorithm, key.publicKey, sigBytes.slice(), signatureBaseBytes)) return {
1394
1269
  verified: true,
1395
1270
  key,
1396
1271
  signatureLabel: sigName
@@ -1404,7 +1279,7 @@ async function verifyRequestRfc9421(request, span, { documentLoader, contextLoad
1404
1279
  currentTime,
1405
1280
  keyCache: {
1406
1281
  get: () => Promise.resolve(void 0),
1407
- set: async (keyId$1, key$1) => await keyCache?.set(keyId$1, key$1)
1282
+ set: async (keyId, key) => await keyCache?.set(keyId, key)
1408
1283
  },
1409
1284
  spec: "rfc9421"
1410
1285
  });
@@ -1481,16 +1356,15 @@ async function doubleKnockInternal(request, identity, options, redirected = 0, v
1481
1356
  signal
1482
1357
  });
1483
1358
  if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
1484
- if (redirected >= maximumRedirection) throw new __fedify_vocab_runtime.FetchError(request.url, `Too many redirections (${redirected + 1})`);
1485
- const location = response.headers.get("Location");
1486
- const redirectRequest = createRedirectRequest(request, location, body);
1487
- if (visited.has(redirectRequest.url)) throw new __fedify_vocab_runtime.FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
1359
+ if (redirected >= maximumRedirection) throw new _fedify_vocab_runtime.FetchError(request.url, `Too many redirections (${redirected + 1})`);
1360
+ const redirectRequest = createRedirectRequest(request, response.headers.get("Location"), body);
1361
+ if (visited.has(redirectRequest.url)) throw new _fedify_vocab_runtime.FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
1488
1362
  return doubleKnockInternal(redirectRequest, identity, {
1489
1363
  ...options,
1490
1364
  body
1491
1365
  }, redirected + 1, visited);
1492
1366
  } else if (response.status === 400 || response.status === 401 || response.status > 401) {
1493
- const logger = (0, __logtape_logtape.getLogger)([
1367
+ const logger = (0, _logtape_logtape.getLogger)([
1494
1368
  "fedify",
1495
1369
  "sig",
1496
1370
  "http"
@@ -1531,13 +1405,10 @@ async function doubleKnockInternal(request, identity, options, redirected = 0, v
1531
1405
  redirect: "manual",
1532
1406
  signal
1533
1407
  });
1534
- if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
1535
- const location = response.headers.get("Location");
1536
- return doubleKnock(createRedirectRequest(request, location, body), identity, {
1537
- ...options,
1538
- body
1539
- });
1540
- }
1408
+ if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) return doubleKnock(createRedirectRequest(request, response.headers.get("Location"), body), identity, {
1409
+ ...options,
1410
+ body
1411
+ });
1541
1412
  }
1542
1413
  if (fulfilled && response.status < 300) {
1543
1414
  await specDeterminer?.rememberSpec(origin, "rfc9421");
@@ -1563,10 +1434,9 @@ async function doubleKnockInternal(request, identity, options, redirected = 0, v
1563
1434
  signal
1564
1435
  });
1565
1436
  if (response.status >= 300 && response.status < 400 && response.headers.has("Location")) {
1566
- if (redirected >= maximumRedirection) throw new __fedify_vocab_runtime.FetchError(request.url, `Too many redirections (${redirected + 1})`);
1567
- const location = response.headers.get("Location");
1568
- const redirectRequest = createRedirectRequest(request, location, body);
1569
- if (visited.has(redirectRequest.url)) throw new __fedify_vocab_runtime.FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
1437
+ if (redirected >= maximumRedirection) throw new _fedify_vocab_runtime.FetchError(request.url, `Too many redirections (${redirected + 1})`);
1438
+ const redirectRequest = createRedirectRequest(request, response.headers.get("Location"), body);
1439
+ if (visited.has(redirectRequest.url)) throw new _fedify_vocab_runtime.FetchError(request.url, `Redirect loop detected: ${redirectRequest.url}`);
1570
1440
  return doubleKnockInternal(redirectRequest, identity, {
1571
1441
  ...options,
1572
1442
  body
@@ -1602,101 +1472,106 @@ function timingSafeEqual(a, b) {
1602
1472
  result |= lenA ^ lenB;
1603
1473
  return result === 0;
1604
1474
  }
1605
-
1606
1475
  //#endregion
1607
- Object.defineProperty(exports, 'deno_default', {
1608
- enumerable: true,
1609
- get: function () {
1610
- return deno_default;
1611
- }
1476
+ Object.defineProperty(exports, "doubleKnock", {
1477
+ enumerable: true,
1478
+ get: function() {
1479
+ return doubleKnock;
1480
+ }
1612
1481
  });
1613
- Object.defineProperty(exports, 'doubleKnock', {
1614
- enumerable: true,
1615
- get: function () {
1616
- return doubleKnock;
1617
- }
1482
+ Object.defineProperty(exports, "exportJwk", {
1483
+ enumerable: true,
1484
+ get: function() {
1485
+ return exportJwk;
1486
+ }
1487
+ });
1488
+ Object.defineProperty(exports, "fetchKey", {
1489
+ enumerable: true,
1490
+ get: function() {
1491
+ return fetchKey;
1492
+ }
1618
1493
  });
1619
- Object.defineProperty(exports, 'exportJwk', {
1620
- enumerable: true,
1621
- get: function () {
1622
- return exportJwk;
1623
- }
1494
+ Object.defineProperty(exports, "fetchKeyDetailed", {
1495
+ enumerable: true,
1496
+ get: function() {
1497
+ return fetchKeyDetailed;
1498
+ }
1499
+ });
1500
+ Object.defineProperty(exports, "formatAcceptSignature", {
1501
+ enumerable: true,
1502
+ get: function() {
1503
+ return formatAcceptSignature;
1504
+ }
1624
1505
  });
1625
- Object.defineProperty(exports, 'fetchKey', {
1626
- enumerable: true,
1627
- get: function () {
1628
- return fetchKey;
1629
- }
1506
+ Object.defineProperty(exports, "fulfillAcceptSignature", {
1507
+ enumerable: true,
1508
+ get: function() {
1509
+ return fulfillAcceptSignature;
1510
+ }
1630
1511
  });
1631
- Object.defineProperty(exports, 'fetchKeyDetailed', {
1632
- enumerable: true,
1633
- get: function () {
1634
- return fetchKeyDetailed;
1635
- }
1512
+ Object.defineProperty(exports, "generateCryptoKeyPair", {
1513
+ enumerable: true,
1514
+ get: function() {
1515
+ return generateCryptoKeyPair;
1516
+ }
1636
1517
  });
1637
- Object.defineProperty(exports, 'formatAcceptSignature', {
1638
- enumerable: true,
1639
- get: function () {
1640
- return formatAcceptSignature;
1641
- }
1518
+ Object.defineProperty(exports, "importJwk", {
1519
+ enumerable: true,
1520
+ get: function() {
1521
+ return importJwk;
1522
+ }
1642
1523
  });
1643
- Object.defineProperty(exports, 'fulfillAcceptSignature', {
1644
- enumerable: true,
1645
- get: function () {
1646
- return fulfillAcceptSignature;
1647
- }
1524
+ Object.defineProperty(exports, "name", {
1525
+ enumerable: true,
1526
+ get: function() {
1527
+ return name;
1528
+ }
1648
1529
  });
1649
- Object.defineProperty(exports, 'generateCryptoKeyPair', {
1650
- enumerable: true,
1651
- get: function () {
1652
- return generateCryptoKeyPair;
1653
- }
1530
+ Object.defineProperty(exports, "parseAcceptSignature", {
1531
+ enumerable: true,
1532
+ get: function() {
1533
+ return parseAcceptSignature;
1534
+ }
1654
1535
  });
1655
- Object.defineProperty(exports, 'importJwk', {
1656
- enumerable: true,
1657
- get: function () {
1658
- return importJwk;
1659
- }
1536
+ Object.defineProperty(exports, "parseRfc9421SignatureInput", {
1537
+ enumerable: true,
1538
+ get: function() {
1539
+ return parseRfc9421SignatureInput;
1540
+ }
1660
1541
  });
1661
- Object.defineProperty(exports, 'parseAcceptSignature', {
1662
- enumerable: true,
1663
- get: function () {
1664
- return parseAcceptSignature;
1665
- }
1542
+ Object.defineProperty(exports, "signRequest", {
1543
+ enumerable: true,
1544
+ get: function() {
1545
+ return signRequest;
1546
+ }
1666
1547
  });
1667
- Object.defineProperty(exports, 'parseRfc9421SignatureInput', {
1668
- enumerable: true,
1669
- get: function () {
1670
- return parseRfc9421SignatureInput;
1671
- }
1548
+ Object.defineProperty(exports, "validateAcceptSignature", {
1549
+ enumerable: true,
1550
+ get: function() {
1551
+ return validateAcceptSignature;
1552
+ }
1672
1553
  });
1673
- Object.defineProperty(exports, 'signRequest', {
1674
- enumerable: true,
1675
- get: function () {
1676
- return signRequest;
1677
- }
1554
+ Object.defineProperty(exports, "validateCryptoKey", {
1555
+ enumerable: true,
1556
+ get: function() {
1557
+ return validateCryptoKey;
1558
+ }
1678
1559
  });
1679
- Object.defineProperty(exports, 'validateAcceptSignature', {
1680
- enumerable: true,
1681
- get: function () {
1682
- return validateAcceptSignature;
1683
- }
1560
+ Object.defineProperty(exports, "verifyRequest", {
1561
+ enumerable: true,
1562
+ get: function() {
1563
+ return verifyRequest;
1564
+ }
1684
1565
  });
1685
- Object.defineProperty(exports, 'validateCryptoKey', {
1686
- enumerable: true,
1687
- get: function () {
1688
- return validateCryptoKey;
1689
- }
1566
+ Object.defineProperty(exports, "verifyRequestDetailed", {
1567
+ enumerable: true,
1568
+ get: function() {
1569
+ return verifyRequestDetailed;
1570
+ }
1690
1571
  });
1691
- Object.defineProperty(exports, 'verifyRequest', {
1692
- enumerable: true,
1693
- get: function () {
1694
- return verifyRequest;
1695
- }
1572
+ Object.defineProperty(exports, "version", {
1573
+ enumerable: true,
1574
+ get: function() {
1575
+ return version;
1576
+ }
1696
1577
  });
1697
- Object.defineProperty(exports, 'verifyRequestDetailed', {
1698
- enumerable: true,
1699
- get: function () {
1700
- return verifyRequestDetailed;
1701
- }
1702
- });